Wireless access - computer network, Computer Networking

Wireless Access

Wireless access connecting end  systems ( that are often  mobile) into the network. Today there are two broad types  of wireless internet access(1) wireless and (2) wide  area wireless. In a wireless LAN wireless users transmit  receive packets to form a base station ( also  known  as a wireless access point)  within a read us of a few tens of meters. The base station is typically  connected to the  wired internet and thus serves to connect wireless users  to the wired  networks. In wide area wireless  access networks the base stations is  managed by a telecommunications  provider and serves users within  a radius of  tens of kilometres.

Wireless LAN are based on IEEE 802.11 technology ( also  knows  as wireless Ethernet and wi fi) are currently enjoying rapid  deployment in  university departments business offices, coffee cafes and homes. Using  this wireless LAN infrastructure students  send  and receive e mail or surf the web  from anywhere in campus ( for example  library dorm  room  classroom  or outdoor  campus bench.

Today  many  residences are combining  to broadband residential access with inexpensive wireless  LAN technology (cable  modern or DSL) with inexpensive wireless LAN technology  to create powerful  home  networks. This home  networks  consists  of a roaming laptop as  well as  three  stationary  PC ( two  wired one wireless) a base station  ( the  wireless access point) which communicates  with the  wireless  PCs  a cable  modern providing  broad  band  access to the internet and a router which  interconnects the base  station and the stationary PC with the cable  modern. This  networks allows  the residents  to having broadband internet access, if  one member roaming form  the kitchen to the backyard or to the bedroom.

When one  access the internet through wireless LAN technology one has typically  need to be within  a few  tens  of meters from  the base station. This is feasible  for home access coffee shop  access and  more generally access within  and around  a building.

 

Posted Date: 3/3/2013 11:54:19 PM | Location : United States







Related Discussions:- Wireless access - computer network, Assignment Help, Ask Question on Wireless access - computer network, Get Answer, Expert's Help, Wireless access - computer network Discussions

Write discussion on Wireless access - computer network
Your posts are moderated
Related Questions
Authentication in PPP PPP can support  authentication operations at the  beginning of a connection. In some  cases reauthentication is also  possible  during  a session.  Endpo

Client  Server Architecture There is an  always  on host  called  server  which  provides  service requests to many other hosts  called  clients. In other words  client progra

Connection Establishment TCP transmits  data in full duplex mode. When two TCP is two machines are  connected they are able  to send segments to each other simultaneously. This


Disadvantages of OSPF protocol i) Single Area ii) High Hardware Requirements iii) Troubleshooting

List some most useful advantages of Token Ring. Here are Token ring's most useful advantages: a. It depends excellent throughput under high-load conditions. b. Token Ring

What are firewalls? Firewalls serve to protect an internal network from external attacks. These external threats can be hackers who need to steal data or computer viruses that

I need help in designing a network for a fictional company.

Suppose there are exactly five packet switches (Figure 4) between a sending host and a receiving host connected by a virtual circuit line (shown as dotted line in figure 4). The tr

Question: (a) Explain and illustrate different architectures for IEEE802.11 (WiFi). (b) The MAC management of IEEE802.11 handles transmitter activity for power management.